Sciweavers

152 search results - page 15 / 31
» Modeling dependencies in security risk management
Sort
View
AIMS
2008
Springer
13 years 12 months ago
A Role-Based Infrastructure for the Management of Dynamic Communities
Abstract. This paper addresses the problem of specifying and establishing secure collaborations between autonomous entities that need to interact and depend on each other in order ...
Alberto E. Schaeffer Filho, Emil Lupu, Morris Slom...
WSC
2004
13 years 11 months ago
Calibrating Credit Portfolio Loss Distributions
Determination of credit portfolio loss distributions is essential for the valuation and risk management of multiname credit derivatives such as CDOs. The default time model has re...
Menghui Cao, William J. Morokoff
CSFW
2005
IEEE
14 years 3 months ago
End-to-End Availability Policies and Noninterference
This paper introduces the use of static information flow analysis for the specification and enforcement of end-toend availability policies in programs. We generalize the decentr...
Lantian Zheng, Andrew C. Myers
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 2 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
SOUPS
2005
ACM
14 years 3 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller